Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 263 (0.031 secs)
You searched for: subject:"Cryptography"
[1] 2 3 4 5 6     Next    Last
[texts]Digit Fast Track Cryptography Vol 07 Issue 11 November 2012 - Digit
Fastrack to Cryptography
Keywords: Cryptography
Downloads: 2
[texts]Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes - Simonetta, Francesco, 1410-1480
Book from Project Gutenberg: Les règles de Cicco Simonetta pour le déchiffrement des écritures secrètes Library of Congress Classification: Z
Keywords: Cryptography
Downloads: 241
[audio]Unreleased Tracks - Ulan Batur
Tracks only released on the Toldstøj cassette and here.
Keywords: Cryptography
Downloads: 3
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI. Jahrhunderts - Meister, Aloys, 1866-1925

Keywords: Cryptography
Downloads: 141
[texts]Cryptomenysis patefacta; or, The art of secret information disclosed without a key. Containing, plain and demonstrative rules, for decyphering all manner of secret writing. With exact methods, for resolving secret intimations by signs or gestures, or in speech. As also an inquiry into the secret ways of conveying written messages, and the several mysterious proposals for secret information, mentioned by Trithemius, &c - Falconer, John, decipherer
Gibson 387
Keywords: Cryptography
Downloads: 874
[texts]Cryptography - Langie, Andr b. 1871-
Bibliography: p. 158
Keywords: Cryptography
Downloads: 3,746
[texts]Cryptography : or, The history, principles, and practice of cipher-writing - Hulme, F. Edward (Frederick Edward), 1841-1909
26
Keywords: Cryptography
Downloads: 2,112
[texts]Cryptography .. - Langie, André, b. 1871-
Bibliography: p. 158. Subtitle on cover [Cryptography ... a study on secret writings]
Keywords: Cryptography
Downloads: 2,100 4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars4.00 out of 5 stars(1 review)
[texts]Die geheimschrift im dienste der Päpstlichen kurie von ihren anfängen bis zum ende des XVI jahrhunderts - Meister, Aloys, 1866- [from old catalog]
Book digitized by Google from the library of Harvard University and uploaded to the Internet Archive by user tpb.
Keywords: Cryptography
Downloads: 1,712
[texts]A treatise on the art of decyphering, and of writing in cypher. With an harmonic alphabet - Thicknesse, Philip, 1719-1792
Book digitized by Google from the library of the University of Michigan and uploaded to the Internet Archive by user tpb.
Keywords: Ciphers; Cryptography
Downloads: 322
[texts]Cryptography : or the history, principles and practice of cipher- writing - Hulme, F. Edward (Frederick Edward), 1841-1909
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Cryptography; Ciphers
Downloads: 524
[texts]Manual for the solution of military ciphers - Hitt, Parker, b. 1878

Keywords: Ciphers; Cryptography
Downloads: 2,016
[texts]Shorthand, cryptography, etc.; catalogue of books on shorthand, cryptography, etc. in the library of Robert Todd, esq., Hadley Green, Barnet - Todd, Robert
The metadata below describe the original scanning. Follow the "All Files: HTTP" link in the "View the book" box to the left to find XML files that contain more metadata about the original images and the derived formats (OCR results, PDF etc.). See also the What is the directory structure for the texts? FAQ for information about file content and naming conventions.
Keywords: Shorthand; Cryptography
Downloads: 2,066
[texts]Chaotic keystream generators for additive stream ciphers - Leader, Jeffery J.
Technical report for period January 1993 - April 1993.
Keywords: CRYPTOGRAPHY; SECURE COMMUNICATIONS
Downloads: 78
[audio]Crypto recipes for your data diet - Pieter Rogaar
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; cryptography
Downloads: 14
[texts]Fragmentariu Criptografic Texte Alese - Dan Toma Dulciu
Some articles about cryptography in Romanian culture.
Keywords: Romania; Cryptography; Eminescu
Downloads: 19
[texts]The Cryptomenytics and Cryptography of Gustavus Selenus in Nine Books - Gustavus Selenus
Draft of an English translation of the Latin work by Gustavus Selenus (the psuedonym of Augustus, duke of Braunschweig-Lüneburg) written in 1624, translated by John William Henry Walden around 1900. This draft was meant to be published, but it never was. It is currently part of the Fabyan Collection of the rare books collections at the Library of Congress, call number Z103.A95 1900. This file is a scan of a photocopy of the manuscript...
Keywords: cryptography; medieval; translations
Downloads: 1,007
[texts]Simon Singh The Code Book ( Teenage Version)
Simon Singh is a popular author and the famous author of the book Fermat's Last Theorem. This is a book he has written on cryptography and makes for a very interesting read.
Keywords: Simon; Singh; Code; Cryptography
Downloads: 341
[texts]Steganographia BSB 1608 - Trithemius, Johannes, 1462-1516
Scans from die Bayerische Staatsbibliothek via Google. This is Trithemius's most famous work, written c. 1499; published Frankfurt, 1606., was placed on the Index Librorum Prohibitorum in 1609 and removed in 1900. This book is in three volumes, and appears to be about magicâspecifically, about using spirits to communicate over long distances. Since the publication of the decryption key to the first two volumes in 1606, they have been known to be actually concerned with cryptography and steganog...
Keywords: occult; demonology; steganography; cryptography
Downloads: 945
[texts]Cryptography In C & C++
Cryptography In C & C++
Keywords: Cryptography In C & C++
Downloads: 36
[texts]Mercury, or, The secret and swift messenger : Shewing, how a man may with privacy and speed communicate his thoughts to a friend at any distance - Wilkins, John, 1614-1672
Held by Gallaudet University Library Deaf Collections and Archives, Washington, D.C. (catalog link: http://catalog.wrlc.org/cgi-bin/Pwebrecon.cgi?BBID=1383691)
Keywords: Cryptography; Gesture; Sign language
Downloads: 468
[texts]Recueil de plusieurs machines militaires et feux artificiels pour la guerre & recreation : auec l'alphabet de Trittemius par laquelle chacun qui sçait escrire peut promptement composer congruement en latin, aussi le moyen d'escrire la nuict á son amy absent / de la diligence de Iean Appier dit Hanzelet, chalcographe et de François Thybourel, me. chyrurgien. - Trithemius, Johannes
19 cm. (4to). [8], 88, 39, [1], 24, 112, [4], 40, [64] p. : 101 [i.e. 99] ill. (engravings)
Keywords: Artillery Military engineering Cryptography
Downloads: 8
[texts]Mathematical recreations and essays - Ball, W. W. Rouse (Walter William Rouse), 1850-1925
Arithmetical recreations.--Geometrical recreations.--Mechanical recreations.--Chessboard recreations.--Magic squares.--Unicursal problems.--Kirkman's school-girls problem.--Miscellaneous problems.--The mathematical tripos.--Three classical geometrical problems.--The parallel postulate.--Insolubility of the algebraic quintic.--Mersenne's numbers.--String figures.--Astrology.--Cryptographs and ciphers.--Hyper-space.--Time and its measurement.--Matter and ether theories
Keywords: Geometry; Cryptography; Ciphers
Downloads: 2,513
[texts]An Overview and Analysis of Private and Public Key DNA Cryptography - K.Sireesha ,V.Srujana
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now vulnerable to attacks, the concept of using DNA Cryptography has been identified as a possible technology that brings forward a new hope for unbreakable algorithms. This paper analyzes the different approaches on DNA based Cryptography
Keywords: Cryptography; SK; AK; PKC; DES; DNA based Cryptography
Downloads: 76
[texts]17. Applied Towards SECURING DATA IN CLOUD Shorunke Muyiwa Musaddiq - SHORUNKE MUYIWA MUSADDIQ
Clouds are rapidly becoming a platform of choice for hosting increasingly complex application software and services. Among the attractive features they offer are elasticity and pay-as-you-go model, which allow businesses to gain access to vast computing resources with minimum upfront investment, and operational costs. Although a great deal of progress has so far been made with respect to the low-level technological underpinning of the clouds, today’s clouds are still considered to be insuffici...
Keywords: Cloud; Data; Cryptography; Encryption; Security
Downloads: 6
[texts]1201700 - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 5
[audio]Samuel-Braunstein-teleportation-part1 - Ian Woolf
Dr Samuel Braunstein about quantum teleportation, why there can never be two Captain Kirks, and how to teleport by fax and truck. Dr Braunstein is professor of informatics at the University of Wales in Bangor, England. THis is part 1 of a two part interview
Keywords: science; teleport; quantum; entanglement; cryptography
Downloads: 385
[audio]AntiCryptography - Joel Anderson
How do we communicate with aliens? How do we send them messages that they can understand?
Keywords: SETI; Aliens; cryptography; cryptograms; puzzles
Downloads: 114
[movies]CLUG Talk - 27 May 2008 - OpenSSL and Certificates - Stefano Rivera
CLUG Talk: OpenSSL and Certificates Speaker: Stefano Rivera Slides: available here More CLUG Talks
Keywords: CLUG; SSL; OpenSSL; PKI; Cryptography
Downloads: 169
[texts]Implementation and efficiency of steganographic techniques in bitmapped images and embedded data survivability against lossy compression schemes - Currie, Daniel L.;Campbell, Hannelore.
Thesis advisor(s): Cynthia E. Irvine, Harold Fredricksen
Keywords: Cryptography; Data compression (Computer science)
Downloads: 247
[texts]Truetrade: An anonymous decentralized marketplace - Tyr Stephansen
A decentralized marketplace cryptocurrency wherein nodes act as shops anonymously. An example implementation is given.
Keywords: computer science; cryptography; blockchain technology
Downloads: 65
[texts]Combined Implementation of Robust Cryptosystem for Non-invertible Matrices based on Hill Cipher and Steganography
In this paper, we have combined the RobustCryptosystem for Non-invertible matrices based on Hill Ciphertechnique with steganography method in order to securelytransmit text message. The steganography method used is LSBinsertion technique. The encryption and steganographymethods are used subsequently along with two randomizationtechnique: one of XOR the encrypted text and another ofrandomized LSB insertion in any cover image...
Keywords: cryptography; steganography; plaintext; stegoobject; cipher
Downloads: 21
[texts]Maguire's code of ciphers [microform] : a comprehensive system of cryptography designed for general use and arranged in conformity with the rules and regulations adopted by the International Convention of Telegraph Companies, respecting "secret language telegrams" - Maguire, Charles H. J. (Charles Henry Joseph)
Filmed from a copy of the original publication held by the D.B. Weldon Library, University of Western Ontario
Keywords: Cryptography; Ciphers; Cryptograhie; Chiffres (Cryptographie)
Downloads: 1,857
[texts]Speculum imaginum veritatis occultæ : exhibens symbola, emblemata, hieroglyphica, ænigmata, omnitam materiæ, quam formæ varietate; exemplis simul, ac præceptis illustratum - Masen, Jakob, 1606-1681
Signatures: A * 2* 3* 4*⁴ ²A B-4A a-d e⁴
Keywords: Signs and symbols; Cryptography; Emblems
Downloads: 573
[movies]Arsdigita University Course 2: Discrete Mathematics - Lecture 20
Lecture on discrete mathematics, given on November 28, 2000. Topics covered: cryptography Lecturer: Shai Simonson
Keywords: arsdigita; computer science; discrete math; cryptography
Downloads: 392
[texts]Secure and Efficient Cluster Selection Mechanism Using Wimax - Vinni Kaur, Amanpreet Kaur, Arvind Pathak
WiMAX technology is a telecommunications technology that offers transmission of wireless data via a number of transmission methods; such as portable or fully mobile internet access via point to multipoint links. As the size of a Wireless Network is much vast because of this the network containing number of base station and mobile station is divided in terms of clusters. Each cluster having a cluster head or the base station the controls all nodes of the network...
Keywords: WiMAX; Handoff; Packets; cryptography; secure and efficient
Downloads: 67
[texts]Principles of Applied Mathematics - Lempel-Ziv Notes - Daniel Kleitman;Peter Shor
We now explain the algorithm that Lempel and Ziv gave in a 1978 paper, and generally called LZ78. This is opposed to LZ77, an earlier algorithm which di_ered signi�cantly in the implementation details but is based on the same general idea. This idea is that if some text is not random, a substring that you see once is more likely to appear again than substrings you haven�t seen.
Keywords: Maths; Algebra; Coding and Cryptography; Codes; Mathematics
Downloads: 10
[texts]17. Eng Unique Information Based Secure RSA Neha Gupta - Neha Gupta, Ravi Kumar Gupta & Shipra Gupta
Computer security is one of the most important parameters considered in any computer system to prevent any data misuse by an unauthorized/ outside intrusion. Cryptography is one technique for data/ computer security. In this paper,           we have proposed a technique for a more secure data transfer which is a alteration to the classical public key crytogarphy method known as Unique Information Based Secure RSA...
Keywords: Cryptography; Public Key; Private Key; Encryption; Decryption
Downloads: 2
[audio]Martin Hellman at Deusto University
Charla de Martin Hellman en la Universidad de Deusto sobre criptografía. Martin Hellman's talk about cryptography at University of Deusto.
Keywords: Martin Hellman, Deusto, university, cryptography, PKI
Downloads: 181
[texts]Fish and I - W.T. Tutte

Keywords: Maths; Algebra; Coding and Cryptography; Mathematics
Downloads: 14
[texts]HACBPS: A Hierarchical Access Control- Based Proxy Signature
In this paper, we propose a new security  protocol which is styled hierarchical access control-based proxy signature (HACBPS).In hierarchical access control, upper security level users can access some secret information hold by lower security level users, but reverse is not allowed. Whereas in proxy signature, on behalf of the original signer, proxy signer can generate the signature on an arbitrary message...
Keywords: cryptography; security; access control; proxy signature; Poset
Downloads: 43
[texts]54
Extensive use of Wireless Sensor Networks is givingrise to different types of threats in certain commercial andmilitary applications. To protect the WSN data communicationagainst various threats appropriate security schemes areneeded. However, WSN nodes are resource constrained, withrespect to limited battery energy, and limited computationaland memory available with each WSN node. Hence, thesecurity model to be used in WSN’s should use minimalresources to the extent possible and it should als...
Keywords: WSN; Cryptography; ECC; Koblitz’s encoding
Downloads: 11
[texts]500 YEARS OF ROMANIAN CRYPTOGRAPHY - Dan Toma Dulciu
This is the story of the Romanian Cryptography, from the beginning till now.
Keywords: cryptography; romania; Evstatie; the protopsalt of Putna
Downloads: 140
[texts]A Study: Cryptology Techniques and Methodologies - Cutifa Safitri, Haroon Shoukat Ali, Jamaludin Bin Ibrahim
Cryptography, as the most important aspect in the never ending evolving information technology era, is being criticized in itsaspect. Information outbreaks make users doubtful on relying on their own information in current cryptosystems. This paper attempts todefine the existing cryptology techniques and measures how strong and ‘bullet proof’ they are. In this paper, a basic encryption, byte tobyte and complex encryption is shown as a study of cryptosystem classes that were used to overcome ...
Keywords: Information Security; Cryptosystems; Network Security; Cryptoanalysis; Cryptography
Downloads: 25
[audio]Samuel-Braunstein-teleportation-part2 - Ian Woolf
Continuing my discussion with Dr Samuel Brainstein about Quantum teleportation, entanglement, encryption, eavesdropping, and true love. Dr Braunstein is Professor of Informatics at the University of Wales in Bangor, England. This is part two of a two part interview
Keywords: science; teleport; quantum; braunstein; cryptography; encrypt; entanglement
Downloads: 399
[texts]A Secured Approach to Visual Cryptographic Biometric Template
BIOMETRIC authentication systems are gainingwide-spread popularity in recent years due to the advances insensor technologies as well as improvements in the matchingalgorithms. Most biometric systems assume that the templatein the system is secure due to human supervision (e.g.,immigration checks and criminal database search) or physicalprotection (e.g., laptop locks and door locks). Preserving theprivacy of digital biometric data (e.g., face images) stored in acentral database has become of para...
Keywords: Visual cryptography; Image scrambling; Random permutation
Downloads: 27
[texts]A graphic user interface for rapid integration of steganography software - Wootten, David Raiman.
"March 1996."
Keywords: Cryptography; Graphical user interfaces (Computer systems)
Downloads: 232
[movies]Ben Martin - Cryptography
Ben Martin could teach the da Vinci coders a thing or two. He's interested In cryptography, the study of secret codes. In this video he tells us a little bit about its history (the Romans were into it way back in Julius Caesar's day). Ben also talks about the everyday uses for cryptography, including cash machines and online Internet transactions with credt cards.
Keywords: Mathematics; University of Auckland; Mathsreach; Cryptography
Downloads: 288
[texts]Needles and haystacks: the search for Ultra in the 1930's - GouazeΓ, Linda Yolande.
Thesis advisors, David Canright, Carlos F. Borges
Keywords: Intelligence service; History; Cryptography; History; Ciphers; History
Downloads: 175
[texts]A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
Downloads: 180
[1] 2 3 4 5 6     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
audio
movies

Terms of Use (10 Mar 2001)